


default search action
Junjian Li
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j19]Junwei Li
, Honglong Chen, Yudong Gao, Junjian Li, Wenjie Wang
, Jimiao Yu, Jinghan Qiu:
FEAT: Frequency Energy Based Backdoor Attack in Deep Neural Networks. Expert Syst. Appl. 278: 127352 (2025) - [j18]Anqing Zhang, Honglong Chen, Xiaomeng Wang, Junjian Li, Yudong Gao
, Xingang Wang:
Defending against backdoor attack on deep neural networks based on multi-scale inactivation. Inf. Sci. 690: 121562 (2025) - [j17]Yudong Gao
, Honglong Chen
, Junjian Li
, Xingang Wang, Abdullah Alharbi
, Amr Tolba
, Feng Xia
:
Frequency is Devious: Deep Stealthy Backdoor in Artificial Intelligence-Based Consumer Internet of Things. IEEE Trans. Consumer Electron. 71(2): 6381-6391 (2025) - [j16]Junjian Li
, Honglong Chen
, Zhe Li
, Anqing Zhang
, Xiaomeng Wang, Xingang Wang, Feng Xia
:
Generative Adversarial Network Based Image-Scaling Attack and Defense Modeling. IEEE Trans. Emerg. Top. Comput. Intell. 9(1): 861-873 (2025) - [j15]Junjian Li
, Hulin Kuang
, Jin Liu
, Hailin Yue
, Jianxin Wang
:
CA2CL: Cluster-Aware Adversarial Contrastive Learning for Pathological Image Analysis. IEEE J. Biomed. Health Informatics 29(7): 5095-5108 (2025) - [j14]Jimiao Yu
, Honglong Chen
, Junjian Li
, Linghan Chen, Yudong Gao
, Weifeng Liu
, Lei Zhang:
Black-Box Adversarial Defense Based on Image Decomposition and Reconstruction. IEEE Trans. Multim. 27: 5909-5921 (2025) - 2024
- [j13]Junjian Li
, Honglong Chen, Yudong Gao
, Shaozhong Guo, Kai Lin
, Yuping Liu, Peng Sun
:
BABE: Backdoor attack with bokeh effects via latent separation suppression. Eng. Appl. Artif. Intell. 138: 109462 (2024) - [j12]Jianyao Yin, Honglong Chen, Junjian Li, Yudong Gao:
Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient. Neural Process. Lett. 56(2): 114 (2024) - [j11]Junjian Li
, Honglong Chen
, Zhichen Ni, Yudong Gao
, Weifeng Liu
, Nan Jiang
:
Image-Scaling Attack on Image Signal Processing Pipelines in Deep Neural Networks-Based Outdoor Vision Applications. IEEE Trans. Consumer Electron. 70(4): 7044-7055 (2024) - [j10]Huansheng Xue
, Honglong Chen
, Qiuli Dai, Kai Lin
, Junjian Li
, Zhe Li
:
CSCT: Charging Scheduling for Maximizing Coverage of Targets in WRSNs. IEEE Trans. Comput. Soc. Syst. 11(3): 3049-3059 (2024) - [j9]Junjian Li
, Honglong Chen
, Peng Sun
, Zhibo Wang
, Zhichen Ni
, Weifeng Liu
:
Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems. IEEE Trans. Ind. Informatics 20(4): 6222-6233 (2024) - [j8]Xiaomeng Wang
, Honglong Chen
, Peng Sun
, Junjian Li
, Anqing Zhang
, Weifeng Liu
, Nan Jiang
:
AdvST: Generating Unrestricted Adversarial Images via Style Transfer. IEEE Trans. Multim. 26: 4846-4858 (2024) - 2022
- [j7]Feng Liang, Honglong Chen
, Kai Lin, Junjian Li, Zhe Li, Huansheng Xue, Vladimir V. Shakhov, Hannan Bin Liaqat:
Route recommendation based on temporal-spatial metric. Comput. Electr. Eng. 97: 107549 (2022) - [j6]Hailin Yue, Jin Liu, Junjian Li
, Hulin Kuang
, Jinyi Lang, Jianhong Cheng, Lin Peng, Yongtao Han, Harrison X. Bai
, Yu-Ping Wang, Qifeng Wang
, Jianxin Wang
:
MLDRL: Multi-loss disentangled representation learning for predicting esophageal cancer response to neoadjuvant chemoradiotherapy using longitudinal CT images. Medical Image Anal. 79: 102423 (2022) - [j5]Junjian Li
, Jin Liu, Hailin Yue, Jianhong Cheng, Hulin Kuang
, Harrison X. Bai, Yu-Ping Wang, Jianxin Wang
:
DARC: Deep adaptive regularized clustering for histopathological image classification. Medical Image Anal. 80: 102521 (2022) - [j4]Jianhong Cheng
, Wei Zhao
, Jin Liu
, Xingzhi Xie, Shangjie Wu, Liangliang Liu
, Hailin Yue, Junjian Li, Jianxin Wang
, Jun Liu
:
Automated Diagnosis of COVID-19 Using Deep Supervised Autoencoder With Multi-View Features From CT Images. IEEE ACM Trans. Comput. Biol. Bioinform. 19(5): 2723-2736 (2022) - [j3]Kai Lin
, Honglong Chen
, Na Yan, Zhe Li
, Junjian Li, Nan Jiang
:
Fast and Reliable Missing Tag Detection for Multiple-Group RFID Systems. IEEE Trans. Ind. Informatics 18(4): 2656-2664 (2022) - [j2]Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni
, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia
:
Edge data based trailer inception probabilistic matrix factorization for context-aware movie recommendation. World Wide Web 25(5): 1863-1882 (2022) - 2017
- [j1]Wenchao Fang, Hanqiao Jiang, Junjian Li, Wenpei Miao, Kang Ma, Wu Xiao:
An intelligent production fluctuation monitoring system for giant oilfield development. Int. J. Embed. Syst. 9(1): 36-44 (2017)
Conference and Workshop Papers
- 2025
- [c13]Hailin Yue, Hulin Kuang, Jin Liu, Junjian Li, Lanlan Wang, Mengshen He, Jianxin Wang:
Bipartite Patient-Modality Graph Learning with Event-Conditional Modelling of Censoring for Cancer Survival Prediction. MICCAI (12) 2025: 98-108 - [c12]Junjian Li, Jin Liu, Hulin Kuang, Hailin Yue, Mengshen He, Jianxin Wang:
MiCo: Multiple Instance Learning with Context-Aware Clustering for Whole Slide Image Analysis. MICCAI (1) 2025: 376-385 - [c11]Hailin Yue, Hulin Kuang, Lei Ma, Jin Liu, Junjian Li, Jianhong Cheng, Jianxin Wang:
VisNet: A Human Visual System Inspired Lightweight Dual-Path Network for Medical Images DenoisingYue, HailinKuang, HulinMa, LeiLiu, JinLi, JunjianCheng, JianhongWang, Jianxin. MICCAI (13) 2025: 666-676 - 2024
- [c10]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang, Weifeng Liu:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. AAAI 2024: 1851-1859 - [c9]Yudong Gao, Honglong Chen, Peng Sun, Zhe Li, Junjian Li, Huajie Shao:
Energy-based Backdoor Defense without Task-Specific Samples and Model Retraining. ICML 2024 - 2023
- [c8]Chenhui Wang, Hulin Kuang, Jin Liu, Junjian Li, Hailin Yue, Jianxin Wang:
Domain-specific Knowledge Guided Self-supervised Learning for Pathological Image Segmentation. BIBM 2023: 1497-1502 - [c7]Hailin Yue, Jin Liu, Hulin Kuang, Jianhong Cheng, Junjian Li, Jianxin Wang:
A Fully Automated CT-Guided Learning for Survival Prediction of Esophageal Cancer. BIBM 2023: 1670-1675 - [c6]Jiahao Liu, Chao Li, Ruoyu Wang, Junjian Li, Wuhao Xia:
A Blockchain-Based Secure Data Sharing Approach with Proxy Re-Encryption. DSC 2023: 128-134 - [c5]Ruoyu Wang, Junjian Li, Chao Li, Naqin Zhou, Jiahao Liu:
A Trust Usage Control Approach for Media Player Based on Intel SGX. DSC 2023: 533-539 - [c4]Junjian Li, Honglong Chen, Yudong Gao, Kai Lin, Yuping Liu:
B³A: Bokeh Based Backdoor Attack with Feature Restrictions. MSN 2023: 677-684 - 2022
- [c3]Jiahui Zheng, Junjian Li, Chao Li, Ran Li:
A SQL Blind Injection Method Based on Gated Recurrent Neural Network. DSC 2022: 519-525 - 2020
- [c2]Hong-Dong Li, Rui Guo
, Junjian Li, Jianxin Wang, Yi Pan
, Jin Liu:
Joint Learning of Primary and Secondary Labels based on Multi-scale Representation for Alzheimer's Disease Diagnosis. BIBM 2020: 637-642 - 2010
- [c1]Qiang Ye
, Junjian Li, Yanxia Jia, Hongwei Du:
GW-GEM: A Reliable Routing Algorithm for Wireless Sensor Networks. GLOBECOM 2010: 1-6
Informal and Other Publications
- 2025
- [i5]Junjian Li, Hulin Kuang, Jin Liu, Hailin Yue, Mengshen He, Jianxin Wang:
MiCo: Multiple Instance Learning with Context-Aware Clustering for Whole Slide Image Analysis. CoRR abs/2506.18028 (2025) - [i4]Hailin Yue, Hulin Kuang, Jin Liu, Junjian Li, Lanlan Wang, Mengshen He, Jianxin Wang:
Bipartite Patient-Modality Graph Learning with Event-Conditional Modelling of Censoring for Cancer Survival Prediction. CoRR abs/2507.16363 (2025) - 2023
- [i3]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. CoRR abs/2307.10184 (2023) - 2022
- [i2]Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia:
Edge Data Based Trailer Inception Probabilistic Matrix Factorization for Context-Aware Movie Recommendation. CoRR abs/2202.10236 (2022) - [i1]Junjian Li, Honglong Chen:
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline. CoRR abs/2206.01733 (2022)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-17 00:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint